Analysis
-
max time kernel
94s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 18:22
Static task
static1
Behavioral task
behavioral1
Sample
0bf6713be95f04babe963b84f31482ba_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0bf6713be95f04babe963b84f31482ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0bf6713be95f04babe963b84f31482ba_JaffaCakes118.html
-
Size
53KB
-
MD5
0bf6713be95f04babe963b84f31482ba
-
SHA1
39d17ae67530ed2633637aee348bda4e7371a6f4
-
SHA256
a5593a152282b4b4b6749fb1bcfea8a8ceefc6541f29ea176a977db049272b9a
-
SHA512
dffcaa22111a73a79647dbacce5ce1dd45cac81d1a1c8c227f80e467d2d479c9d431e82c86fcbf5da071a878dcbaa99387f401c8c91cf1e4335bf3fb300920eb
-
SSDEEP
1536:CkgUiIakTqGivi+PyUGrunlYw63Nj+q5Vy0R0w2AzTICbbqoV/t9M/dNwIUTDmDS:CkgUiIakTqGivi+PyUGrunlYw63Nj+qp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000ff59f271cbf41435b5b67aab8834fed3b191ca1203960c02113eeadd5c07a171000000000e80000000020000200000000e0cca50a850a6d6cfaf47bccf2675f366744ec3538e3c4c9be956b203cd7785200000004df442235c943003ffee2027ecea5dc3c0e6ef0794f095eab838111aa27e08e9400000003c12e19d0d14c11098fed79331b5adaad0092bcb1360698ca586592fe374db7ef330e5f8da780b3999b42bd9843a6455b3f1fc92f21ed747b5fcd1392a657662 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000a152cb60d8ae25aeb4f192034003e38d18a45cdfaafc35e8195947269f8fdebc000000000e80000000020000200000005552c37caa1e0fd58683528da7b4979cc23ae2139de514731290303164556eac90000000bdb746fb0e63eddd0c1d8ba05a49253998900242941502fa168556e69b899fd767c8c419b8c7d1c2ffad1bc3455177eb3ddf8a4378cfeee281ad076c5f31eaf121a51a9e6201539e9fb13f514d57ebefb0be66b19e3d4d9589bfe0c097d2747370a1363f1ce96646deec8edffbde01e0f600ae92ff00bd0ea664e40b6cd6bf80494107ffba09f4a199fe5331026fe8a7400000009e7708102d8b0700178a777912608a50b912453a8587c50a80bcbab444ac640b0ced7066d8a55b2749bf82456641de878501b34ea6c60f1b338a1ab53690fcf4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ab7e2ef814db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434055244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59274371-80EB-11EF-9DBD-525C7857EE89} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 376 iexplore.exe 376 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 376 wrote to memory of 2884 376 iexplore.exe 30 PID 376 wrote to memory of 2884 376 iexplore.exe 30 PID 376 wrote to memory of 2884 376 iexplore.exe 30 PID 376 wrote to memory of 2884 376 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0bf6713be95f04babe963b84f31482ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574afb227cc6a1962e15e21588b8c5bf2
SHA11264dceaba518b81e796a3c6a39e6be2042c3c26
SHA256a38bf5de292e080e50bca37687480ca3f9e416e676a40bcb6b71284460b5b716
SHA512d636da1e4836fd300ec4dfad614dffe299f1a477b21eb6202f5e3aa22a389d455cb63cf710190c12a881c80e239a6232eb171691424592eb8640fbe653eb5619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8fd73009c8c7c614ab826346bd8c878
SHA1da315d69d1d0d1a60662b8b6209f5a07a289b24f
SHA25682c0b91be6c580315fcca4bf2dc77caa6b346ad5c6574012d6e00ad55d39f567
SHA512790cc93f680f574bb4039b52cfbec849f7dbacbc2f82cae6ffbddba1510a953dde07b20997549c342e325c8dfcec43a35025d25160cc668dd03a829db471083e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e2d786752f7c1df776f130796f925e
SHA126cb0947fdae159f53aa773d4259051f551f6192
SHA2564e2d913b2bfdec8186b43e83ac42a799c2f94d8d8c6f3cccfd6897331f9e8d39
SHA512180b42e9251023bcd75935e2ec82e5e8065cb46c87f9560059335d3a3ce7d4a01cbc1ec8e2ce531464c38d60be171ab55e516e2b5aaf448276d54251aebe810d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e7cba0e00c533c1b31e2acde84e310
SHA1e7fd235e74e0765716f43cf3ace5aeb8f7c8fbe0
SHA256ee08373b2196a679ad09218bb33a74c3a00896a9efced1566ca81c001f713d0c
SHA512b6844ee3a9945d1b278a99c6c06a5b1fb1233e0b69cfa4199270b563f2424a0838b101c04311c33ea8bfe3d8c6cd337fadb8d07b75d7dff2e8c7f9c102d1b6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcf508154e0849cfd3c37ae7c83a5fe
SHA1fcf2c158314de22b4841a5811f6d0c0133eda078
SHA256ec6fd8dbbb561a9ae4fd0959bd3bfcb8d98287c3ef51c99610fe743eba2ddf0d
SHA512ac625370da11a1533fb2ca763c8879694d65b0c70a20389b74934d8515864fd9d83f25b98e695905d7b029e35cc007706c858ffdf9d7f54f2b7b250a769d3503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3fa3c55817f25f268ccde41fdceea07
SHA1ce702bf80fa557c5550a79686f60f13201f28abc
SHA2567cc055f76575d4d0c245d2a5af81ffcd2a3a34961d5057c256664f7d5c3ea59a
SHA5128ec633948fc472332401a59726b3172a3ec3ff38042eb251cd934206bd96052a7a682df822c41e4b9977624c09521a7295b2bf6d5d6079eeeb099a6753b89c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e56abb66fec4d8c4ed1f141556433f3
SHA18c5789347a880469dbdab9b0ff1d7aafc174d7b0
SHA2569dc17c21155dc8df85a55de8dcefb9c8ecf4ba1cc954dc889025bd04dc2dcf4f
SHA512964d0e3020caeb8e123ad88d885530177f5e4ec9d46508a551e9d4abb9256508a4399a2cd48ce32953ae65ea7dbc6037ecbeb95569f021a595d35d0b9a26e548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ac7de38fe99f44e9245ef821bd3c04
SHA18c560d9b8d42e8d2a707eec55074cd3714943134
SHA256e6cbe453db58fa660c969f5ccdafee8dc1b3ef993bdbb1be144320929d0107fe
SHA512a7efc499ab9a769e7fa9faf5a600855416ac7334e63647f68e38b89396e50e7f510f6fdde148269fd62e1e260a378963955662da696df104c7da60f11d460d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e99c4e7e155f3f221075280df0bbe12
SHA114d2b2b4f02ced19deec8901d2ad49e327a4172e
SHA256e0ba902a629b26be52a96784943d34acbf65171fd1788852900ff7d35a7e7e56
SHA5125a50252225b32b0d09483fb70746f5fff1d9d4516627b45f533af6cec7ef19790ea05a6f82d0acbccc96dcaf49222b5d65bbf92879a8e9347204bec2529cd51e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96cb8db2f065a6fe85910e9560ee642
SHA1504989104b2fb6c013be8c67256b50b3e8fd3354
SHA256a4b6a4e9c2e820305347d9819c67ad3bfe09eb962e6ab090fb0f4f3b9b1d7550
SHA512b9be5b199dca66cfae938909f5847dba61de6ec5a47cde811f789e504e9abdfded5710e669f19d7507133bb17a4fbed49a7ecc4732b951efaebc78ad2bf2aafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54975d9445789ddd5d0d21e2f71f82d4b
SHA19976df38ed2816032dc37c77e7c890f983563229
SHA25614a41f6384c60f6ece56b674c0e0b4a9df08a5e9d1d6e69502dc5dbd05b112e5
SHA512d4fe8f7910390b9fbefda6fc6ccefa976c378e0f7a0e0b4eac9229658b2b07750cb70714727195fd5ef4b622f84c710a9a54d664661423d585b082f26e79c908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d255cfa11a31589712d4fadf73a929b
SHA18b88df3f53c1752055d17baf9f69818bf7e362a1
SHA2567d33f3788be892a2dfa6b2b2a6973ee462c08aa950a0ff27894f747dc361a4c1
SHA5122fbd3b040ae321eb5978fbf862d3f24cc8bfc509d824ab7d7c1789367ce6110a09f5a7bc33c441bafd0076d5622ed82cf3ecf7e86cb9dbb2a3dca4df5afdae6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3b6720c5cb72369694b1932f5e7c85
SHA1dc67d1bd5e4f04eea87eb65f5ae2def25c865aa7
SHA256b09d997371eddc16bfe07182727ee70e73231614c1965a7f7e0732ba35435335
SHA512bf5fb0e6a43c3866317c2a20d115bcc8c0dc9939d4b9c5c507ce749558d4f30d62e8666346c35137228964bf00d60cdcc3c739f62286218ce547f39520a2741e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332d6737ff580a15d32708dca1be5ab4
SHA1dfb03cbf61a351d3e8696778174cd2586c9a6de2
SHA256b6b4fd488bca8e01bc405ae667496152323124306c37a72d8f9e82f7072a6b32
SHA512a25daf3436e0417f4d87c7edf54f396eb47a37221b1c7acf74d6b68b81938d394631d545f2852efe3e101451a32731ab1aba55d45a65c2f1321d6099b420743e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9f13de65d28206897141f5333ef1be
SHA1bb2f2645b1bedc1a5834396c8b9b00edc1950d93
SHA2569cc2e5e3b61e89d04374737c1c53eb8455b260425cc20f077f8773cfc1c020df
SHA51218ff815a077cfcd81c30650b4a8b354fb6762f35b3ffe989fe3f65c2fc485b3104163b86c966386255092009b1acba27ad3d925d4b11a0ae03bacd0bc46fd7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bdfd6d500889b39a4e1fa1b74c3bcc9
SHA1b7d3caf63ac9b2f8d22c016bcace84eeaf3c715c
SHA25659d99afc788af7ae3d8defb6850fcc8da5d50a6af32f2923619defa178a23f0f
SHA5129ab2aebd79048434a95932722d44fa8451188b5a5035b6713a7fbb534cf756664b6857a5fa264313accf42b516a53d44e19425d500e2307ffcb4ecb111f5e58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553b510fc8d0b56fb43081a873c5f2c88
SHA1f84ae3b5a4d3c94210055ba851c0c79ecc8f9b22
SHA256acde021df32727b4da545ecb134337b33ced530c2765517829a7e18b8e993299
SHA512aa1edffac38257d3ce882d5f4b99e62f84426d4a752c6436d1a0691613993aed38ead75ad12e95ef23a617ce07e7078e116bdc1fb0899aa6f435ce7a7df0c721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971f73f21691a2f6ddfc9e61902bd676
SHA103e399d4cc9b1e9edde707518f796fd640c7e11c
SHA2560ff1bf0a032f1006821113cd22387d2e3350d915fc334a35440356ecb276b4ad
SHA512a0972ab44da050a51100c012ee86102d64ce477378a771bd5c91b9221b0d5c8fa5e3321bbc9ecc5257765af89f0b73a8824fe0d6fbea70d098fb8c2e479b4365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e348c317124cdf7bc36946f3603106
SHA1a526592714f2e684bc5bbd86575b51de3ec5b726
SHA2560f9f489813ecc9b52744cf143b4acd869ea6b1b80681c1c40d5c8cd7ad8fac14
SHA512e5e591e753b785c0d2f39475ce68216481df67610d3333c0effb9cf31875d1b3ed70b7692b60eff5fec16817a0061184277892006ea18b096fce26783f000af1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b